Headline

“The National Security Agency has an Achilles heel, according to some anti-surveillance activists. The key vulnerability, according to members of the OffNow coalition of advocacy groups: The electronic spy agency’s reliance on local utilities. The activists would like to turn off the wat...

“David Cameron has pledged to use the intelligence services to investigate the ‘dark net’ where paedophiles share materials on peer-to-peer online networks after child protection agencies warned that new security measures announced by Google and Microsoft would do little to tackle ...

“Here is some safe analysis for you: In the future, senior US policy-makers will declare that they have had a ‘wake-up call’ regarding the cyber threat. Your enterprise, whether you are in or out of government, will also have senior leaders that will make that statement. It is easy to make...

“If you’re looking for tangible information sharing success stories around attack intelligence, some might point to the prompt publishing of indicators of compromise (IOC) as an example. Security and forensics companies will publish MD5 hashes of malware, IP addresses involved in attacks, ma...

“‘The Chinese government is directing and executing a large-scale cyber espionage campaign against the United States, and to date has successfully targeted the networks of U.S. government and private organizations, including those of DoD, defense contractors, and private firms,’ the report...

“Indeed, surveys have found the unremitting surveillance scandal could take billion-dollar bites out of businesses whose stock-in-trade is user information – which is to say, much of the online economy today. But the events seem to be having the opposite effect on organizations promisin...

“The program is written to overload healthcare.gov with meaningless traffic generated automatically, the researchers said. The data flood, creating what security professionals call a ‘denial of service’ attack, would then prevent legitimate users from accessing the site.” Source:Hack...

“Security researchers at ZScaler have uncovered a malware attack, seemingly targeted against the computers of Chinese game players. Interestingly, the attack doesn’t exploit a newly discovered vulnerability – but instead takes advantage of a security hole that was patched by Microsoft almo...

“An MIT computer called PREP was the first to be penetrated. It was Nov. 2, 1988, and the time was approximately 8 p.m. Within hours and into the following morning, an estimated 10% of all machines connected to the Internet would crash, overloaded with several copies of a mysterious program. &...

“Adobe Systems Inc said on Tuesday that the scope of a cyber-security breach disclosed nearly a month ago was far bigger than initially reported, with attackers obtaining data on more than 38 million customer accounts. The software maker also said that hackers had stolen part of the source cod...